Page 1 of 2
SBM4304 IS Security and Risk Management
Semester 2, 2018
Worth 10%
Assignment Details
This case study requires students to choose an organisation that used information systems
as main part of the organization business operations. The student must investigate why
information systems are vulnerable to destruction, e
or, abuse, and system quality
problems. The output is a
ief report of the key findings.
Tasks
1. Select an organization that use information system to conduct day to day business
operations.
2. Identify and illustrate the vulnerability of the information systems related to the
selected organization.
3. Discuss why and how these vulnerabilities can be destruction, abused and effect the
organization system quality.
4. Write a
ief report (700 words) to demonstrate your key findings.
Marking Criteria
Student ID: _________________, Student Name:________________________
Assessment
Attributes
Level of Attainment
Fail Pass Credit Distinction High Distinction
Introduction
(10%)
This is not
elevant to the
assignment
topic.
Some relevance
and
iefly
presented.
Generally
elevant and
analysed.
Topics are
elevant and
soundly analysed.
All topics are
pertinent and
covered in depth.
Ability to think
critically and source
material is
demonstrated
Due date: Week 3
Group/individual: Individual assignment
Word count: 700
Weighting: 10%
Unit learning outcomes: [ULO1]
Page 2 of 2
Demonstrate
why IS are
vulnerable to
destruction,
e
or, abuse,
and system
quality
problems
(70%)
Inadequate
understanding
of why IS are
vulnerable to
destruction,
e
or, abuse,
and system
quality
problems;
cannot discuss
concepts in
own words
Basic knowledge
only of why IS
are vulnerable
to destruction,
e
or, abuse,
and system
quality
problems;
limited depth of
asic concepts
Exhibits
eadth
and depth of
understanding of
why IS are
vulnerable to
destruction,
e
or, abuse, and
system quality
problems
Exhibits accurate
and detailed
eadth and depth
of understanding
of why IS are
vulnerable to
destruction, e
or,
abuse, and system
quality problems
Displays exceptional
understanding of
concepts and their
practical application
of why IS are
vulnerable to
destruction, e
or,
abuse, and system
quality problems
Conclusion
(10%)
Argument is
confused and
disjointed
Adequate
cohesion and
conviction
Mostly consistent
logical and
convincing
Consistency logical
and convincing
Logic is clear and
easy to follow with
strong arguments
Reference
(10%)
Clear styles
with excellent
source of
eferences.
Clear
eferencing style
Generally good
eferencing style
Clear referencing
style
Clear styles with
excellent source of
eferences.
TOTAL MARKS: 100% Total Marks Obtained:
Comments:
Lecturer: Location: Date: